Back to Search Start Over

Study on Security iSCSI Based on SSH.

Authors :
Yue Hao
Jiming Liu
Yu-Ping Wang
Yiu-ming Cheung
Hujun Yin
Licheng Jiao
Jianfeng Ma
Yong-Chang Jiao
Weiping Liu
Wandong Cai
Source :
Computational Intelligence & Security (9783540308195); 2005, p457-462, 6p
Publication Year :
2005

Abstract

The iSCSI protocol is becoming an important protocol to enable remote storage access through the ubiquitous TCP/IP networks. This paper analyzes the security and performance characteristics of the iSCSI protocol, points out the limitation of the security iSCSI scheme based on IPSec, and presents the security iSCSI scheme based on SSH. With application of SSH port forwarding, a secure tunnel can be built in TCP layer to ensure the security of iSCSI session. Experiments show that throughput of the security iSCSI based on SSH rises up 20% and CPU utilization greatly lowers 50% with the same encryption algorithm, compared with the security iSCSI based on IPSec. So the performance of the security iSCSI based on SSH is obviously superior to the one based on IPSec. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540308195
Database :
Supplemental Index
Journal :
Computational Intelligence & Security (9783540308195)
Publication Type :
Book
Accession number :
32885763
Full Text :
https://doi.org/10.1007/11596981_67